Vulnerabilities / Threats
8/11/2010
10:26 AM
50%
50%

Touchscreen Smudges Pose Security Risk

Residual fingerprint oils on smartphones, ATMs, and other devices may reveal passwords and other confidential data, find security researchers.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
Prepare for a new mobile security threat: smudges. Or to be more precise, the oily residue left behind by fingers on your iPhone, Android, BlackBerry, or other touchscreen mobile device may help an attacker deduce your password.

That's the message from researchers at the University of Pennsylvania, who presented a paper at this week's Usenix conference analyzing "Smudge Attacks on Smartphone Touch Screens."

Based on their results, "the practice of entering sensitive information via touchscreens needs careful analysis," said the researchers. "The Android password pattern, in particular, should be strengthened." But they cautioned that any touchscreen device, including ATMs, voting machines, and PIN entry devices in retail stores, could be susceptible to smudge attacks.

Touchscreens, of course, are an increasingly common feature of mobile computing devices. According to Gartner Group, 363 million touchscreen mobile devices will be sold in 2010, an increase of 97% over last year's sales. But are passwords entered via touchscreens secure?

To find out, the researchers studied two different Android smartphones, the HTC G1 and the HTC Nexus1, evaluating different photography techniques for discerning a smudge pattern. With the best setup, they saw a complete smudge pattern two-thirds of the time, and could partially identify one 96% of the time. Furthermore, in ideal conditions -- say, if an attacker had physical possession of the device -- the researchers could oftentimes see finger-stroke directionality too, meaning that "the order of the strokes can be learned, and consequently, the precise patterns can be determined," they said.

While Android 2.2 adds an option for alphanumeric passwords, the team tested the numbers-only password protocol, which uses a virtual nine-digit keypad and imposes certain restrictions on repeat "contact points," as well as swipe patterns. The researchers note that numeric passwords are likely to remain the norm, especially for power users who must continuously "swipe in" to their device.

Given the contact point restrictions, the researchers found that "the password space of the Android password pattern contains 389,112 possible patterns." But an attacker will face a lockout -- typically, 30 seconds in duration -- after inputting an incorrect password. That would make manually entering too many passwords laborious. But by comparing smudge patterns with a dictionary of common patterns, an attacker might significantly reduce the password space. Thankfully, there's a failsafe on Android phones, since after 20 failed password attempts, a user must enter his or her Google username and password to authenticate.

The good news is that for now, even with a smudge attack, an attacker typically wouldn't be able to reduce the password space to 20 or fewer possibilities. But going forward, don't rule out the possibility that enterprising attackers may add on additional techniques to help see through smudges.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5314
Published: 2014-11-23
Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages.

CVE-2014-5325
Published: 2014-11-23
The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity refe...

CVE-2014-5326
Published: 2014-11-23
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?